On the Internet Connectivity in Africa

Author(s):  
Assane Gueye ◽  
Peter Mell ◽  
Desire Banse ◽  
Faical Y. Congo
2021 ◽  
Vol 5 (6) ◽  
pp. 1161-1170
Author(s):  
Valen Brata Pranaya ◽  
Theophilus Wellem

The validity of the routing advertisements sent by one router to another is essential for Internet connectivity. To perform routing exchanges between Autonomous Systems (AS) on the Internet, a protocol known as the Border Gateway Protocol (BGP) is used. One of the most common attacks on routers running BGP is prefix hijacking. This attack aims to disrupt connections between AS and divert routing to destinations that are not appropriate for crimes, such as fraud and data breach. One of the methods developed to prevent prefix hijacking is the Resource Public Key Infrastructure (RPKI). RPKI is a public key infrastructure (PKI) developed for BGP routing security on the Internet and can be used by routers to validate routing advertisements sent by their BGP peers. RPKI utilizes a digital certificate issued by the Certification Authority (CA) to validate the subnet in a routing advertisement. This study aims to implement BGP and RPKI using the Bird Internet Routing Daemon (BIRD). Simulation and implementation are carried out using the GNS3 simulator and a server that acts as the RPKI validator. Experiments were conducted using 4 AS, 7 routers, 1 server for BIRD, and 1 server for validators, and there were 26 invalid or unknown subnets advertised by 2 routers in the simulated topology. The experiment results show that the router can successfully validated the routing advertisement received from its BGP peer using RPKI. All invalid and unknown subnets are not forwarded to other routers in the AS where they are located such that route hijacking is prevented.  


2016 ◽  
pp. 1-31
Author(s):  
M. G. Michael

When or how uberveillance will be implemented in its full-blown manifestation is still a subject for some intriguing discussion and a topic of robust disagreement, but what is generally accepted by most of the interlocutors is that an “uberveillance society” will emerge sooner rather than later, and that one way or another this will mean an immense upheaval in all of our societal, business, and government relationships. What is apparent from the numerous qualitative and quantitative studies conducted is that microchipping people is a discernibly divisive issue. If we continue on the current trajectory, we will soon see further divisions – not just between those who have access to the Internet and those who do not, but between those who subjugate themselves to be physically connected to the Web of Things and People, and those who are content enough to simply have Internet connectivity through external devices like smart phones, to those who opt to live completely off the grid. Time will only tell how we as human-beings will adapt after we willingly adopt innovations with extreme and irreversible operations. This introduction serves to provide a background context for the term uberveillance, which has received significant international attention since its establishment.


Author(s):  
Antony Palackal ◽  
Meredith Anderson ◽  
B. Paige Miller ◽  
Wesley Shrum

Can the internet improve the lot of women in the developing world? This study investigates the degree to which the internet affects the constraints on women pursuing scientific careers. We address this question in the context of the scientific community of Kerala, India, developing a “circumvention” argument that fundamentally implicates information and communication technologies in shaping gender roles. We begin by reviewing two main constraints identified in prior research (educational and research localism) that increase the likelihood of restricted professional networks. Next, we examine the extent to which women scientists have gained access to e-science technologies. With evidence of increased access, we argue that the presence of connected computers in the home has increased consciousness of the importance of international contacts. We conclude by proposing that internet connectivity is helping women scientists to circumvent, but not yet undermine, the patrifocal social structure that reduces social capital and impedes career development.


Sensors ◽  
2020 ◽  
Vol 20 (5) ◽  
pp. 1409
Author(s):  
Angus Wong ◽  
Yan Tai Chow

As satellite communications provide ubiquitous coverage, they play a key role in providing Internet connectivity in remote or marginalized areas, so as to enable the vision of a truly global connectivity of the Internet of Things (IoT). However, these areas often lack reliable electricity supply. Thus, this paper proposes a satellite internet access point powered by solar energy, so that a stable Internet connection can be provided. The access point provides Wi-Fi coverage so that sensors, IoT, and devices can connect to the access point using the Wi-Fi, a common wireless technology. Our design took some cost-saving measures to make it affordable and selected the components that require minimal maintenance operations. The satellite access point costs about USD $500, and can provide four days of Internet connectivity without solar energy.


2017 ◽  
Vol 6 (2) ◽  
pp. 61-76
Author(s):  
Arunbaby Stephen

The Internet, with its vast connectivity and ample resources, provides an easy platform for committing crimes. Cyber stalking is one such offence, which has grown in the last two decades with the advent of cheap and fast internet connectivity. The Internet provides various means by which cyber stalking can occur. The lack of boundaries on the internet creates more risk for the users and as more and more people start using internet, the scope and complexity of this problem will only increase. More and more states are passing exclusive statutes for tackling Cyber Stalking, believing that their offline stalking statutes are not enough to handle different aspects of this issue. This paper analyses the different legislations passed across the world to tackle cyber stalking. With stalking itself being a comparatively fresh offence in India, it has been a late entry into the field of cyber stalking, with the first provision being made in 2013, in the form of Section 354 D of the Indian Penal Code. The article examines the shortfalls of this provision and the ways in which they can be tackled.


2021 ◽  
Vol 6 (2) ◽  
pp. 29-40
Author(s):  
Mohd Nizam Osman ◽  
Khairul Anwar Sedek ◽  
Nor Arzami Othman ◽  
Muhammad Afiqhakimi Rosli ◽  
Mushahadah Maghribi

Network security is designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. Every person, including organization requires a degree of network security solutions in place to protect it from the ever-growing landscape of cyber threats in the wild today.  This paper aims to design and implement TorVPN as an access point using Raspberry Pi in enhancing security and privacy in Local Area Network (LAN).  This access point was implemented by using the combination of The Onion Router (Tor) and Virtual Private Network (VPN) services. Then, the graphical user interface application was developed to assist and facilitate the user to access the network securely without having the difficulties to configure and install any software. To determine the effectiveness of the proposed work, there were two experiments involved in this study. Firstly, the confidentiality test which to verify its privacy in keeping the information securely. Secondly, the performance test of the Internet connectivity in terms of ping, download and upload speed. The encourage results was expected as the confidentiality tested on the TorVPN access point network has shown the positive outcome by securing client’s Internet data packet. While, the Internet connectivity is not stable enough, when the client’s IP address changed in the network. Hence, the combination VPN and Tor service using Raspberry Pi as an access point inside the LAN is suitable and secure the information in the network, but do not suggest for user who wants a good Internet connectivity. 


2019 ◽  
Vol 15 (11) ◽  
pp. 155014771988884 ◽  
Author(s):  
Tayyaba Zaheer ◽  
Asad Waqar Malik ◽  
Anis Ur Rahman ◽  
Ayesha Zahir ◽  
Muhammad Moazam Fraz

Smart cities and the Internet of Things have enabled the integration of communicating devices for efficient decision-making. Notably, traffic congestion is one major problem faced by daily commuters in urban cities. In developed countries, specialized sensors are deployed to gather traffic information to predict traffic patterns. Any traffic updates are shared with the commuters via the Internet. Such solutions become impracticable when physical infrastructure and Internet connectivity are either non-existent or very limited. In case of developing countries, no roadside units are available and Internet connectivity is still an issue in remote areas. In this article, we propose an intelligent vehicular network framework for smart cities that enables route selection based on real-time data received from neighboring vehicles in an ad hoc fashion. We used Wi-Fi Direct–enabled Android-based smartphones as embedded devices in vehicles. We used a vehicular ad hoc network to implement an intelligent transportation system. Data gathering and preprocessing were carried on different routes between two metropolitan cities of a developing country. The framework was evaluated on different fixed route-selection and dynamic route-selection algorithms in terms of resource usage, transmission delay, packet loss, and overall travel time. Our results show reduced travel times of up to 33.3% when compared to a traditional fixed route-selection algorithm.


2015 ◽  
Vol 10 (4) ◽  
pp. 156 ◽  
Author(s):  
Daniel Abubakar ◽  
Rhoda Diyoshak

Abstract Objective – This study has the objective of establishing whether the undergraduate students of the Faculty of Natural Sciences, University of Jos, have access to and use Internet facilities in the University library. Methods – A survey research design was adopted for this study and questionnaires were used in gathering data. Statistical methods used in the analysis include percentages, frequencies, and Chi-Square test for measuring the association of library visit and use of the Internet. Results – The analysis of the data and findings indicated that there is Internet connectivity in the library. The findings also revealed that few students (15.5%) use the computer and the Internet on a daily basis. The problems of slow Internet connection at peak periods and unsteady power supply were clearly identified. Furthermore, the analysis revealed that there is no association between the students’ library visits and their use of the Internet for most academic purposes, except for downloading articles. Conclusion – The presence of Internet connectivity in the library, does not translate to meaningful academic behaviour among the students. Therefore, sensitising and training of the students on Internet usage were recommended for better academic performance and life-long learning.


Sign in / Sign up

Export Citation Format

Share Document